Exam 3: Computer and Internet Crime

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Debit and credit cards which contain a memory chip that is updated with encrypted data every time the cards are used are called .

(Short Answer)
4.8/5
(32)

A(n) is a security incident prevention tool that evaluates whether an organization has a well-considered security policy in place and if it is being followed.

(Short Answer)
4.9/5
(29)

An antivirus software scans for a specific sequence of bytes, known as a , that indicates the presence of specific malware.

(Multiple Choice)
4.8/5
(38)

According to the 2010/11 CSI Computer Crime and Security Survey, malware infection incidents were the most common security incident.

(True/False)
4.8/5
(33)

Smart and talented hackers who are technically inept are referred to as lamers or script kiddies by more skilled hackers.

(True/False)
4.9/5
(37)

The policy is a template available from the SANS Institute that defines the means to establish a culture of openness, trust, and integrity in business practices.

(Multiple Choice)
4.8/5
(36)

The regulates the collection of the content of wire and electronic communications.

(Multiple Choice)
4.8/5
(31)

Installation of a corporate firewall is the least common security precaution taken by businesses as it does not provide sufficient security.

(True/False)
4.9/5
(35)

The process of assessing security­related risks from both internal and external threats to an organization's computers and networks is called .

(Short Answer)
5.0/5
(40)

A(n) works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling protocols, which encrypt data at the sending end and decrypt it at the receiving end.

(Multiple Choice)
4.8/5
(36)

People who use illegal means to obtain trade secrets from a competitor are called .

(Short Answer)
4.9/5
(27)

are poorly trained and inadequately managed employees who mean well but have the potential to cause much damage.

(Multiple Choice)
4.7/5
(36)

is the act of fraudulently using email to try to get the recipient to reveal personal data.

(Multiple Choice)
4.9/5
(34)

The use of cloud computing and virtualization software has significantly reduced computer security concerns.

(True/False)
4.8/5
(32)

The cost to repair the worldwide damage done by a computer worm has exceeded $1 billion on more than one occasion.

(True/False)
5.0/5
(30)

operates in a software layer that runs on top of the operating system.

(Short Answer)
5.0/5
(33)

test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go.

(Multiple Choice)
4.9/5
(36)

detracts recipients from the ability of recipients to communicate effectively due to full mailboxes and relevant emails being hidden among many unsolicited messages.

(Short Answer)
4.9/5
(34)

Competitive intelligence is conducted by industrial spies.

(True/False)
4.9/5
(44)

The cooperation between an employee of a company and an outsider to commit fraud against the company is called _____.

(Short Answer)
4.8/5
(43)
Showing 61 - 80 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)